IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Multimedia (View All Report Types)
1 - 25 of 209 Matches Previous Page  |  Next Page
Inside the Industry: Tales from the SOC
sponsored by ConnectWise
WEBCAST: How much do you know about what actually goes on behind the scenes when a cybersecurity incident occurs? Access this webinar to hear from cybersecurity and SOC experts as they share the inside scoop on what happens outside of the public eye in the event of an incident.
Posted: 18 Mar 2021 | Premiered: Mar 18, 2021

ConnectWise

Cybereason Video 2 – Live Attack Simulation
sponsored by Cybereason
WEBCAST: Today’s attackers can carry out a persistent, stealthy network compromise. How does this happen, and what can you do to stop it? Access this webinar to get an interactive look at how today’s multi-stage attack campaigns operate and why a behavioral approach to detection is essential to stopping SUNBURST and broader malicious operations.
Posted: 26 Feb 2021 | Premiered: Feb 26, 2021

Cybereason

Rethinking Cyber Risk in a Re-globalized World with Andrea Little Limbago, VP Research and Analysis
sponsored by Interos
WEBCAST: The global pandemic has created seismic shifts in technology trends, particularly as they pertain to the global economy. Organizations are being driven to rethink their policies on security and risk.
Posted: 23 Feb 2021 | Premiered: Nov 5, 2020

Interos

SolarWinds and the Supply Chain, the Threat We've Ignored for Too Long
sponsored by Interos
WEBCAST: The SolarWinds attacks caught the entire country off its guard. What can security teams learn from them? Access this webcast to hear from Robert Brese, a VP and Executive Partner at Gartner, as he joins cybersecurity leaders to discuss fundamental changes that must be implemented to address the SolarWinds nation-state supply chain attacks.
Posted: 23 Feb 2021 | Premiered: Dec 22, 2020

Interos

API Security & the OWASP API Top 10
sponsored by Traceable
VIDEO: The OWASP API Top 10 project set out with a clear goal – to identify and provide insight into the most detrimental API vulnerabilities that exist across today’s organizations. Watch this episode of The API Security & the OWASP API Top 10 webinar series for a deep dive into 4 of the 10 critical API threats.
Posted: 17 Feb 2021 | Premiered: 03 Jan 2021

Traceable

API Security & the OWASP API Top 10 (BOLA/IDOR) - 1 of 4
sponsored by Traceable
WEBCAST: Bad actors have moved beyond attacking just applications – they’re attacking APIs, too. But what makes APIs prime targets? How has app security changed? Why is there a need for a new OWASP project for APIs? Access this webcast to answer these questions and to cover Broken Object Level Authentication (BOLA), the most critical API vulnerability.
Posted: 17 Feb 2021 | Premiered: May 20, 2020

Traceable

Bitdefender Endpoint Detection and Response (EDR)
sponsored by Bitdefender
VIDEO: Data breaches spiked in 2020 – affecting nearly every country and industry vertical. COVID-19 certainly was part of the issue – but outdated and traditional security methods also share the responsibility. Watch this short video to learn about the tools and capabilities required to meet the demands of today’s cyberthreats.
Posted: 11 Feb 2021 | Premiered: 11 Feb 2021

Bitdefender

Changing the paradigm of security testing
sponsored by Cymulate
VIDEO: According to the SANS institute, half of organizations test their security controls once a year or less. At this cadence, most organizations will be ill-prepared for today’s dynamic cyberthreats. Watch this video to learn about the value of attack and breach simulation, and how to get started at your organization.
Posted: 08 Feb 2021 | Premiered: 08 Feb 2021

Cymulate

The Journey from EDR to MDR
sponsored by Bitdefender
VIDEO: Managed Detection and Response (MDR) represents the fastest growing sector of cybersecurity and it is very clear that security has now become even more important than ever before. This video provides an overview of Endpoint Detection And Response (EDR), MDR and how to know when it’s time to make the switch to MDR.
Posted: 05 Feb 2021 | Premiered: 27 Nov 2020

Bitdefender

Attack Simulation
sponsored by Cybereason
VIDEO: In this attack simulation, Cybereason security leaders provide a hands-on demonstration of a multi-stage attack in order to showcase the possible entry points for an attack and how to best prevent and defend against these threats – watch now to get started.
Posted: 05 Feb 2021 | Premiered: 05 Feb 2021

Cybereason

Top Security Concerns for New Technology Deployments
sponsored by Thales
VIDEO: Thales releases an annual Data Threat Report, which compiles their research into the evolving landscape of cyberthreats, data security, and more. Watch this video for a 45-minute walkthrough of this year’s results, which include everything from zero trust, to mutlicloud environments, to quantum computing and everything in between.
Posted: 29 Jan 2021 | Premiered: 29 Jan 2021

Thales

Improving Security and Compliance in Hybrid Cloud with Automation
sponsored by Red Hat
WEBCAST: Massive global shifts towards hybrid cloud environments are making cybersecurity more difficult to achieve than ever before. This Red Hat webinar offers exclusive insight into how automation can improve security and compliance in hybrid cloud environments – watch now to get started.
Posted: 28 Jan 2021 | Premiered: Jan 28, 2021

Red Hat

The Security Implications of Running Software in Containers
sponsored by Red Hat
VIDEO: It’s no surprise that most software development teams prefer the speed, scalability and flexibility of containers. However, it’s critical to consider the security implications of running software in containers. Watch this webinar for a closer look at the security considerations your organization needs to make when it comes to containers.
Posted: 26 Jan 2021 | Premiered: 26 Jan 2021

Red Hat

Security Compliance and Data Privacy the Open Source Way
sponsored by Red Hat
VIDEO: As our world grows increasingly data-driven, ensuring the privacy and security of customer data becomes a top priority for organizations – especially as each new compliance mandate is enforced. Watch this Red Hat webinar to learn more about the evolving landscape of data security and privacy.
Posted: 26 Jan 2021 | Premiered: 26 Jan 2021

Red Hat

Manage Secrets throughout DevSecOps with Red Hat and CyberArk
sponsored by Red Hat
VIDEO: Emphasizing security throughout DevOps, also known as DevSecOps, has become a common practice across organizations. This webinar highlights how identity and access management (IAM) can fit into the software development lifecycle – watch this webinar to explore the role of IAM in DevSecOps.
Posted: 25 Jan 2021 | Premiered: 25 Jan 2021

Red Hat

Achieving security and compliance in Red Hat OpenShift Dedicated
sponsored by Red Hat
VIDEO: In this webinar from Red Hat’s online Security Symposium, join distinguished Red Hat expert Bill Montgomery as he offers a closer look at Red Hat’s OpenShift Dedicated (OSD), highlighting 8 key security and compliance features, the benefits of a hosted vs. self-managed models, and more – watch now to get started.
Posted: 25 Jan 2021 | Premiered: 25 Jan 2021

Red Hat

Keynote Tackling Security in the World of Containers and Hybrid Cloud
sponsored by Red Hat
WEBCAST: Placing security at the center of your organization’s processes, technology and culture is critical for addressing modern cyberthreats. This webinar features the Chief Security Architect, who offers best practices and strategic insight into successfully adopting a security culture – watch now to get started.
Posted: 22 Jan 2021 | Premiered: Jan 22, 2021

Red Hat

How to Architect a Secure Remote Access Solution Without Sacrificing Performance
sponsored by ThousandEyes
WEBCAST: The COVID-19 pandemic brought on a seismic shift in the way enterprises work and where employees connect from — prompting enterprise IT to quickly scale and update VPN access to cope with increased usage. In this webinar, learn how ThousandEyes remote workforce solution enables IT teams to architect a solution without compromising on performance.
Posted: 22 Jan 2021 | Premiered: Jan 22, 2021


Implementing a Hybrid Cloud Using Security & Compliance Automation
sponsored by Red Hat
WEBCAST: Maintaining visibility, control and security while ensuring governance and compliance is paramount. This becomes more difficult and arduous in a hybrid infrastructure consisting of physical, virtual, cloud and container environments. Watch this webinar to see how Red Hat can help you with these challenges by automating security and compliance.
Posted: 22 Jan 2021 | Premiered: May 14, 2020

Red Hat

Avoiding the Crippling Effects of Ransomware through Early Detection & Response
sponsored by Fidelis
PODCAST: Ransomware remains high on the list of security concerns for enterprises, CISOs and CIOs. But early detection can help your organization, and it’s key in avoiding significant damage and cost. Tune into this podcast to hear former NSA CISO Chris Kubic as he discusses why ransomware is so dangerous and how to protect against it.
Posted: 21 Jan 2021 | Premiered: Jan 21, 2021

Fidelis

DevOps Security, Monitoring & Compliance with OpenShift and Sysdig
sponsored by Red Hat
VIDEO: IT, cloud and DevOps-related risks are on the rise and addressing these challenges alone can be resource-intensive. In this webinar, join experts at Red Hat and Sysdig as they discuss how to extend security, compliance and monitoring capabilities with a secure-by-design platform – watch now to get started.
Posted: 21 Jan 2021 | Premiered: 21 Jan 2021

Red Hat

Automating TLS provisioning with OpenShift Service Mesh
sponsored by Red Hat
VIDEO: Traditional application servers are being replaced by modern application microservices architectures that enable distributed workforces to collaborate. This webinar highlights the importance of using mutual TLS (mTLS) to secure communications between services and overviews some of the nuances about its setup – watch now to get started.
Posted: 21 Jan 2021 | Premiered: 21 Jan 2021

Red Hat

Fidelis Extended Detection and Response (XDR)
sponsored by Fidelis
VIDEO: Security teams are responsible for more threats than ever before. As a result, security stacks are bloated, and analysts overloaded. What can security teams do to overcome this overload and get back to mounting coordinated responses? Take two minutes to watch this short video and exhibiting Fidelis’ Extended Detection & Response.
Posted: 15 Jan 2021 | Premiered: 15 Jan 2021

Fidelis

Keeping Remote Workers Safe Webcast
sponsored by Forcepoint
VIDEO: As organizations continue to enable their remote workers, ensuring their security (without sacrificing productivity) becomes a critical practice. Watch this webinar for 6 remote worker security best practices from top security strategists
Posted: 12 Jan 2021 | Premiered: 12 Jan 2021

Forcepoint

Axis Security Video: Safely Delivering Simple, Secure and Managed 3rd Party Access
sponsored by Axis Security
VIDEO: VPNs, despite their long-standing rate of success in securing corporate networks, do not hold up in a remote world. In particular, offering third parties remote VPN access presents a major risk to your network. Watch this video by Axis Security to see how you can deliver secure access to third parties without their ever touching your network.
Posted: 11 Jan 2021 | Premiered: 09 Sep 2020

Axis Security
1 - 25 of 209 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences